Lomar: A local defense against poisoning attack on federated learning X Li, Z Qu, S Zhao, B Tang, Z Lu, Y Liu IEEE Transactions on Dependable and Secure Computing 20 (1), 437-450, 2021 | 81 | 2021 |
When attackers meet AI: Learning-empowered attacks in cooperative spectrum sensing Z Luo, S Zhao, Z Lu, J Xu, YE Sagduyu IEEE Transactions on Mobile Computing 21 (5), 1892-1908, 2020 | 62 | 2020 |
Adversarial machine learning based partial-model attack in IoT Z Luo, S Zhao, Z Lu, YE Sagduyu, J Xu Proceedings of the 2nd ACM workshop on wireless security and machine …, 2020 | 57 | 2020 |
No training hurdles: Fast training-agnostic attacks to infer your typing S Fang, I Markwood, Y Liu, S Zhao, Z Lu, H Zhu Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 45 | 2018 |
Cyber deception for computer and network security: Survey and challenges Z Lu, C Wang, S Zhao arXiv preprint arXiv:2007.14497, 2020 | 23 | 2020 |
When seeing isn't believing: On feasibility and detectability of scapegoating in network tomography S Zhao, Z Lu, C Wang 2017 IEEE 37th International Conference on Distributed Computing Systems …, 2017 | 15 | 2017 |
Entrapment for wireless eavesdroppers S Fang, T Wang, Y Liu, S Zhao, Z Lu IEEE INFOCOM 2019-IEEE Conference on Computer Communications, 2530-2538, 2019 | 12 | 2019 |
Wireless training-free keystroke inference attack and defense E Yang, S Fang, I Markwood, Y Liu, S Zhao, Z Lu, H Zhu IEEE/ACM Transactions on Networking 30 (4), 1733-1748, 2022 | 11 | 2022 |
Low-cost influence-limiting defense against adversarial machine learning attacks in cooperative spectrum sensing Z Luo, S Zhao, R Duan, Z Lu, YE Sagduyu, J Xu Proceedings of the 3rd ACM Workshop on Wireless Security and Machine …, 2021 | 11 | 2021 |
Energy-efficeent Uneven Clustering Algorithm CS Zhang, J Xing, SQ Zhao Computer Engineering and Applications 52 (7), 106-109, 2016 | 11 | 2016 |
Orthogonality-sabotaging attacks against OFDMA-based wireless networks S Zhao, Z Lu, Z Luo, Y Liu IEEE INFOCOM 2019-IEEE Conference on Computer Communications, 1603-1611, 2019 | 10 | 2019 |
Perception-aware attack: Creating adversarial music via reverse-engineering human perception R Duan, Z Qu, S Zhao, L Ding, Y Liu, Z Lu Proceedings of the 2022 ACM SIGSAC conference on computer and communications …, 2022 | 9 | 2022 |
Proactive anti-eavesdropping with trap deployment in wireless networks Q He, S Fang, T Wang, Y Liu, S Zhao, Z Lu IEEE Transactions on Dependable and Secure Computing 20 (1), 637-649, 2022 | 9 | 2022 |
How to test the randomness from the wireless channel for security? Z Qu, S Zhao, J Xu, Z Lu, Y Liu IEEE Transactions on Information Forensics and Security 16, 3753-3766, 2021 | 9 | 2021 |
Performance Analysis of IQI Impaired Cooperative NOMA for 5G‐Enabled Internet of Things H Guo, X Guo, C Deng, S Zhao Wireless Communications and Mobile Computing 2020 (1), 3812826, 2020 | 8 | 2020 |
Measurement integrity attacks against network tomography: Feasibility and defense S Zhao, Z Lu, C Wang IEEE Transactions on Dependable and Secure Computing 18 (6), 2617-2630, 2019 | 8 | 2019 |
How can randomized routing protocols hide flow information in wireless networks? S Zhao, Z Lu, C Wang IEEE Transactions on Wireless Communications 19 (11), 7224-7236, 2020 | 6 | 2020 |
Comb Decoding towards {Collision-Free}{WiFi} S Zhao, Z Qu, Z Luo, Z Lu, Y Liu 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2020 | 5 | 2020 |
Smartphone location spoofing attack in wireless networks C Hu, Y Liu, Z Lu, S Zhao, X Han, J Xiong Security and Privacy in Communication Networks: 17th EAI International …, 2021 | 4 | 2021 |
HoneyBreath: An Ambush Tactic Against Wireless Breath Inference Q He, E Yang, S Fang, S Zhao International Conference on Mobile and Ubiquitous Systems: Computing …, 2022 | 3 | 2022 |